AIS 5

Cards (83)

  • Hacking
    Unauthorized access, modification, or use of a computer system or other electronic device
  • Social Engineering
    Techniques, usually psychological tricks, to gain access to sensitive data or information
  • Malware
    Any software which can be used to do harm
  • Hijacking
    • Gaining control of a computer to carry out illegal activities without the user's knowledge
  • Botnet Robot Network
    • Network of hijacked computers
    • Hijacked computers carry out processes without users knowledge
    • Zombie -hijacked computer
    • Bot Herders
  • Denial-of-Service (DoS) Attack
    • Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service
  • Spamming
    • Simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something
    • Spammers also stage dictionary attacks (also called direct harvesting attacks)
  • Spoofing
    • Making an electronic communication look as if it comes from a trusted official source to lure the recipient into providing information
  • Zero-day attack
    • Attack between the time a new software vulnerability
  • Cross-Site Scripting (XSS)

    • Unwanted code is sent via dynamic Web pages disguised as user input
  • Buffer Overflow
    • Data is sent that exceeds computer capacity causing program instructions to be lost and replaced with attacker instructions
  • SQL Injection (Insertion)
    • Malicious code is inserted in the place of query to a database system
  • Man-in-the-Middle
    • Hacker places themselves between client and host. Intercept
  • Masquerading or impersonation
    • Pretending to be an authorized user to access a system
  • Piggybacking
    • riding with someone
  • Password Cracking
    • Penetrating system security to steal passwords
  • War Dialing
    • Computer automatically dials phone numbers looking for modems
  • Phreaking
    • Attacks on phone systems to obtain free phone service
  • Data Diddling
    • Making changes to data before, during, or after it is entered into a system
  • Data Leakage
    • Unauthorized copying of company data
  • Pod slurping
    • Using a small device with storage capacity to download unauthorized data
  • Salami Technique
    • Taking small amounts from many different accounts
  • Cyber-extortion
    • Threatening to harm a company or a person if a specified amount of money is not paid
  • Cyber-Bullying
    • Using the Internet, cell phones, or other communication technologies to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person
  • Sexting
    • Exchanging sexually explicit text messages and revealing pictures, usually by means of a phone
  • Internet Terrorism
    • Act of disrupting electronic commerce and harming computers and communications
  • Internet Misinformation
    • Using the Internet to spread false or misleading information
  • Internet Auction
    • Using an Internet auction site to defraud another person
    • Unfairly drive up bidding
    • Seller delivers inferior merchandise or fails to deliver at all
    • Buyer fails to make payment
  • Click fraud
    • Manipulating click numbers to inflate advertising bills
  • Internet Pump-and-Dump
    • Using the Internet to pump up the price of a stock and then selling it
  • Web cramming
    • Offering a free website for a month, developing a worthless website, and charging the phone bill of the people who accept the offer for months, whether they want to continue using the website or not
  • Software piracy
    • Unauthorized copying or distribution of copyrighted software
    • Selling a computer with preloaded illegal software
    • Installing a single-license copy on multiple machines
    • Loading software on a network server and allowing unrestricted access to it in violation of the software license agreement
  • Identity Theft
    • Assuming someone else's identity
  • Pretexting
    • Inventing a scenario, that will lull someone info divulging sensitive information
  • Posing
    • Using a fake business to acquire sensitive information
  • Phishing
    • Sending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive data
  • Pharming
    • Redirects Web site to a spoofed Web site
  • Carding
    • Refers to activities performed on stolen credit cards
  • Evil twin
    • Wireless network with the same name as a legitimate wireless access point
  • Typosquatting/URL Hijaking
    • Typographical errors when entering a Web site name cause an invalid site to be accessed